Note: we have a VPN client app for Ubuntu/Debian/Mint distros, please check the KB article.
This guide describes how to configure OpenVPN on Linux using the Network Manager tool, with AES 256-bit encryption and 4096-bit RSA authentication. The setup process should be identical/very similar on all distros because Network Manager is standard.
You can import the OpenVPN config files directly into Network Manager or create the connection from scratch.
Method 1
This method is the quickest, by importing the .ovpn server profile
- Download the .ovpn server profile(s) you want to use from our repository
The profiles are found in the subfolders, such as AES-256-UDP/
- Open the Network Settings and click on the “+” sign to add a new connection type, from the menu select
Import from file...
- Select the .ovpn server profile you downloaded earlier, add your VPN username and password, click
Add
or Save
to save it
- You can now find the VPN connection profile listed when you click on the network icon in the notifications bar
Method 2
This method should be used if the import feature doesn’t work as expected.
-
Open your browser and download our ca.crt and the tls-preshared-256.key from the repository (important: download the CA certificate file with Right click > Save as in Firefox; left click would auto-import the CA into the certificates store instead of downloading it)
-
Open the Network Settings
> Add a new connection and select OpenVPN
-
In the settings window, you have to enter the following:
Connection name: choose a name to identify this connection or leave it unchanged
Gateway: the server hostname you want to connect to (list at https://vpn.ac/status) such as us1.vpn.ac
Authentication Type: Password
Enter your VPN username and password
CA Certificate: select the ca.crt
file you downloaded earlier
Open the Advanced...
section
- Choose port 8000 or 50000. If you use a TCP connection, use ports 8333 or 5900.
- Open the
Security
tab and select Cipher AES-256-GCM
and HMAC-Authentication SHA512
- Open the
TLS Authentication
tab, check Verify peer (server)
, choose Server
from the drop-down menu. Check Use additional TLS authentication
and select the tls-preshared-256.key
file. Select 1
for Key Direction
- Save it and connect.